<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"><glsaid="201307-01"><title>HAProxy: Multiple vulnerabilities</title><synopsis>Multiple vulnerabilities have been found in HAProxy, allowing
attackers to execute arbitrary code or cause Denial of Service.
</synopsis><producttype="ebuild">HAProxy</product><announced>2013-07-11</announced><revisedcount="1">2013-07-11</revised><bug>464340</bug><bug>473674</bug><access>remote</access><affected><packagename="net-proxy/haproxy"auto="yes"arch="*"><unaffectedrange="ge">1.4.24</unaffected><vulnerablerange="lt">1.4.24</vulnerable></package></affected><background><p>HAProxy is a free, very fast and reliable solution offering high
availability, load balancing, and proxying for TCP and HTTP-based
applications.
</p></background><description><p>Multiple vulnerabilities have been discovered in HAProxy. Please review
the CVE identifiers referenced below for details.
</p></description><impacttype="high"><p>A remote attacker could send a specially crafted request, possibly
resulting in execution of arbitrary code with the privileges of the
application or a Denial of Service condition.
</p></impact><workaround><p>There is no known workaround at this time.</p></workaround><resolution><p>All HAProxy users should upgrade to the latest version:</p><code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=net-proxy/haproxy-1.4.24"
</code></resolution><references><urilink="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1912">CVE-2013-1912</uri><urilink="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2175">CVE-2013-2175</uri></references><metadatatag="requester"timestamp="2013-07-07T15:13:45Z">
pinkbyte
</metadata><metadatatag="submitter"timestamp="2013-07-11T23:08:33Z">
pinkbyte
</metadata></glsa>